Extend self-healing capabilities to devices and apps and ensure that critical controls are always present and working as intended.
Take action on devices to protect data, or maintain and prove compliance.
Manage, track and, recover devices, with an unbreakable connection to every endpoint.
Simplify your IT asset management by tracking and securing all your devices and data with one zero-touch, automated platform.
Maximize the value of your security spend with an unbreakable, undeletable connection to all your devices and data.
Forrester study reveals new endpoint security challenges
The Third Question: What CISOs Aren’t Asking and What’s at Stake
Firmware-embedded by these leading systems manufacturers
Available from resellers and distributors worldwide
Extend Absolute’s self-healing capabilities to your applications
Manage customer device and remediate risks from a single cloud-based console
Forrester study reveals new endpoint security challenges.
Global CISOs share the biggest challenge facing cybersecurity teams today.
Learn why Absolute Software is the leader in Endpoint Resilience®
Review financial performance, stock info, and investor resources.
Known Historic Vulnerabilities
When vulnerabilities are brought to our attention we address issues and ensure the security of our customer environments.
Published: May 11, 2018 | Last Updated: Sep 24, 2020
Absolute Computrace Agent, as distributed on certain Dell Inspiron systems through 2009, has a race condition with the Dell Client Configuration Utility (DCCU), which allows privileged local users to change Computrace Agent's activation/deactivation status to the factory default via a crafted TaskResult.xml file.
Learn More
The stub component of Absolute Computrace Agent V70.785 executes code from a disk's inter- partition space without requiring a digital signature for that code, which allows attackers to execute code on the BIOS. This allows a privileged local user to achieve persistent control of BIOS behavior, independent of later disk changes.
Absolute Computrace Agent V80.845 and V80.866 does not have a digital signature for the configuration block, which allows attackers to set up communication with a web site other than the intended search.namequery.com site by modifying data within a disk's inter-partition space. This allows a privileged local user to execute arbitrary code even after that user loses access and all disk partitions are reformatted.